WEKO3
アイテム
{"_buckets": {"deposit": "ac0fb2a1-0076-4de6-ac0b-9ec2a58df8da"}, "_deposit": {"created_by": 3, "id": "4748", "owners": [3], "pid": {"revision_id": 0, "type": "depid", "value": "4748"}, "status": "published"}, "_oai": {"id": "oai:nitech.repo.nii.ac.jp:00004748", "sets": ["31"]}, "author_link": ["11304", "8540", "15248", "15249"], "item_10001_biblio_info_28": {"attribute_name": "書誌情報", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "1999-10-20", "bibliographicIssueDateType": "Issued"}, "bibliographicIssueNumber": "10", "bibliographicPageEnd": "2184", "bibliographicPageStart": "2178", "bibliographicVolumeNumber": "E82-A", "bibliographic_titles": [{"bibliographic_title": "IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"}]}]}, "item_10001_description_36": {"attribute_name": "内容記述", "attribute_value_mlt": [{"subitem_description": "In this paper, we show that the principle of quantum cryptography can be applied not only to a key distribution scheme but also to a data transmission scheme. We propose a secure data transmission scheme in which an eavesdropping can be detected based on sharing the bases Alice (the sender) and Bob (the receiver) have. We also show properties of this scheme.", "subitem_description_type": "Other"}]}, "item_10001_description_38": {"attribute_name": "フォーマット", "attribute_value_mlt": [{"subitem_description": "application/pdf", "subitem_description_type": "Other"}]}, "item_10001_full_name_27": {"attribute_name": "著者別名", "attribute_value_mlt": [{"nameIdentifiers": [{"nameIdentifier": "8540", "nameIdentifierScheme": "WEKO"}, {"nameIdentifier": "1000030188130 ", "nameIdentifierScheme": "NRID", "nameIdentifierURI": "http://rns.nii.ac.jp/nr/1000030188130 "}], "names": [{"name": "内匠, 逸"}]}]}, "item_10001_publisher_29": {"attribute_name": "出版者", "attribute_value_mlt": [{"subitem_publisher": "Institute of Electronics, Information and Communication Engineers"}]}, "item_10001_source_id_30": {"attribute_name": "ISSN", "attribute_value_mlt": [{"subitem_source_identifier": "09168508", "subitem_source_identifier_type": "ISSN"}]}, "item_10001_source_id_32": {"attribute_name": "書誌レコードID(NCID)", "attribute_value_mlt": [{"subitem_source_identifier": "AA10826239", "subitem_source_identifier_type": "NCID"}]}, "item_10001_version_type_33": {"attribute_name": "著者版フラグ", "attribute_value_mlt": [{"subitem_version_resource": "http://purl.org/coar/version/c_970fb48d4fbd8a85", "subitem_version_type": "VoR"}]}, "item_creator": {"attribute_name": "著者", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "Kudo, Takamitsu", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "15248", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "Usuda, Tsuyoshi Sasaki", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "15249", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "Takumi, Ichi", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "8540", "nameIdentifierScheme": "WEKO"}, {"nameIdentifier": "1000030188130 ", "nameIdentifierScheme": "NRID", "nameIdentifierURI": "http://rns.nii.ac.jp/nr/1000030188130 "}]}, {"creatorNames": [{"creatorName": "Hata, Masayasu", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "11304", "nameIdentifierScheme": "WEKO"}]}]}, "item_files": {"attribute_name": "ファイル情報", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2017-01-24"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "E82-A_2178.pdf", "filesize": [{"value": "566.2 kB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensefree": "Copyright(c)1999 IEICE http://search.ieice.org/index.html", "licensetype": "license_free", "mimetype": "application/pdf", "size": 566200.0, "url": {"label": "本文_fulltext", "url": "https://nitech.repo.nii.ac.jp/record/4748/files/E82-A_2178.pdf"}, "version_id": "1123b8fc-84cd-4f25-b071-e3dbf650186d"}]}, "item_language": {"attribute_name": "言語", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"resourcetype": "journal article", "resourceuri": "http://purl.org/coar/resource_type/c_6501"}]}, "item_title": "Application of Quantum Cryptography to an Eavesdropping Detectable Data Transmission", "item_titles": {"attribute_name": "タイトル", "attribute_value_mlt": [{"subitem_title": "Application of Quantum Cryptography to an Eavesdropping Detectable Data Transmission", "subitem_title_language": "en"}]}, "item_type_id": "10001", "owner": "3", "path": ["31"], "permalink_uri": "https://nitech.repo.nii.ac.jp/records/4748", "pubdate": {"attribute_name": "公開日", "attribute_value": "2013-06-25"}, "publish_date": "2013-06-25", "publish_status": "0", "recid": "4748", "relation": {}, "relation_version_is_last": true, "title": ["Application of Quantum Cryptography to an Eavesdropping Detectable Data Transmission"], "weko_shared_id": 3}
Application of Quantum Cryptography to an Eavesdropping Detectable Data Transmission
https://nitech.repo.nii.ac.jp/records/4748
https://nitech.repo.nii.ac.jp/records/47484e9fbf77-a963-491d-8da5-c5857c7f3bd6
名前 / ファイル | ライセンス | アクション |
---|---|---|
本文_fulltext (566.2 kB)
|
Copyright(c)1999 IEICE http://search.ieice.org/index.html
|
Item type | 学術雑誌論文 / Journal Article(1) | |||||
---|---|---|---|---|---|---|
公開日 | 2013-06-25 | |||||
タイトル | ||||||
言語 | en | |||||
タイトル | Application of Quantum Cryptography to an Eavesdropping Detectable Data Transmission | |||||
言語 | ||||||
言語 | eng | |||||
資源タイプ | ||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||
資源タイプ | journal article | |||||
著者 |
Kudo, Takamitsu
× Kudo, Takamitsu× Usuda, Tsuyoshi Sasaki× Takumi, Ichi× Hata, Masayasu |
|||||
著者別名 | ||||||
姓名 | 内匠, 逸 | |||||
書誌情報 |
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 巻 E82-A, 号 10, p. 2178-2184, 発行日 1999-10-20 |
|||||
出版者 | ||||||
出版者 | Institute of Electronics, Information and Communication Engineers | |||||
ISSN | ||||||
収録物識別子タイプ | ISSN | |||||
収録物識別子 | 09168508 | |||||
書誌レコードID(NCID) | ||||||
収録物識別子タイプ | NCID | |||||
収録物識別子 | AA10826239 | |||||
著者版フラグ | ||||||
出版タイプ | VoR | |||||
出版タイプResource | http://purl.org/coar/version/c_970fb48d4fbd8a85 | |||||
内容記述 | ||||||
内容記述タイプ | Other | |||||
内容記述 | In this paper, we show that the principle of quantum cryptography can be applied not only to a key distribution scheme but also to a data transmission scheme. We propose a secure data transmission scheme in which an eavesdropping can be detected based on sharing the bases Alice (the sender) and Bob (the receiver) have. We also show properties of this scheme. | |||||
フォーマット | ||||||
内容記述タイプ | Other | |||||
内容記述 | application/pdf |